CVE-2025-59810: Information disclosure in Fortinet FortiSOAR on-premise
An improper access control vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow information disclosure to an authenticated attacker via crafted requests
AI Analysis
Technical Summary
CVE-2025-59810 is an improper access control vulnerability identified in Fortinet FortiSOAR, a security orchestration, automation, and response (SOAR) platform widely used for incident management and security operations. The vulnerability affects both on-premise and PaaS versions from 7.3.0 through 7.6.2. It allows an authenticated attacker with low privileges to craft specific requests that bypass intended access restrictions, resulting in unauthorized disclosure of sensitive information. The flaw does not require user interaction and has a low attack complexity, making it feasible for insiders or compromised accounts to exploit. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. FortiSOAR’s role in aggregating and automating security data means that leaked information could include sensitive incident data, credentials, or configuration details, potentially aiding further attacks. Although no public exploits are reported yet, the medium CVSS score (6.2) and ease of exploitation warrant timely mitigation. The vulnerability was reserved in September 2025 and published in December 2025, indicating recent discovery. Fortinet has not yet provided patch links, so organizations must monitor vendor advisories closely. The vulnerability’s scope covers multiple major FortiSOAR versions, indicating a broad impact across deployments.
Potential Impact
For European organizations, the impact of CVE-2025-59810 can be significant due to FortiSOAR’s role in centralizing security operations and sensitive incident data. Unauthorized information disclosure could expose internal security workflows, incident response plans, or sensitive credentials, increasing the risk of follow-on attacks such as lateral movement or privilege escalation. Organizations in critical infrastructure sectors (energy, finance, healthcare) that rely on FortiSOAR for automated security orchestration may face increased risk of targeted attacks exploiting leaked information. The medium severity reflects that while system availability and integrity are not directly impacted, confidentiality breaches can undermine trust and compliance with data protection regulations such as GDPR. Additionally, attackers with authenticated access—potentially insiders or compromised accounts—can exploit this vulnerability without user interaction, increasing the threat surface. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. European entities with extensive Fortinet deployments should consider this vulnerability a priority for risk assessment and mitigation.
Mitigation Recommendations
1. Implement strict role-based access controls (RBAC) in FortiSOAR to limit user privileges to the minimum necessary, reducing the risk that an attacker can exploit this vulnerability. 2. Monitor and audit API and system logs for unusual or unauthorized request patterns that could indicate attempts to exploit access control weaknesses. 3. Apply vendor patches immediately once Fortinet releases them; maintain close communication with Fortinet support channels for updates. 4. Conduct internal security reviews and penetration tests focusing on access control mechanisms within FortiSOAR deployments. 5. Enforce multi-factor authentication (MFA) for all FortiSOAR user accounts to reduce the risk of credential compromise. 6. Segment FortiSOAR infrastructure within the network to limit exposure and lateral movement in case of compromise. 7. Educate security operations staff about the vulnerability and encourage vigilance for suspicious activity. 8. Review and update incident response plans to incorporate potential scenarios involving information disclosure from SOAR platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-59810: Information disclosure in Fortinet FortiSOAR on-premise
Description
An improper access control vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow information disclosure to an authenticated attacker via crafted requests
AI-Powered Analysis
Technical Analysis
CVE-2025-59810 is an improper access control vulnerability identified in Fortinet FortiSOAR, a security orchestration, automation, and response (SOAR) platform widely used for incident management and security operations. The vulnerability affects both on-premise and PaaS versions from 7.3.0 through 7.6.2. It allows an authenticated attacker with low privileges to craft specific requests that bypass intended access restrictions, resulting in unauthorized disclosure of sensitive information. The flaw does not require user interaction and has a low attack complexity, making it feasible for insiders or compromised accounts to exploit. The vulnerability impacts confidentiality but does not affect integrity or availability of the system. FortiSOAR’s role in aggregating and automating security data means that leaked information could include sensitive incident data, credentials, or configuration details, potentially aiding further attacks. Although no public exploits are reported yet, the medium CVSS score (6.2) and ease of exploitation warrant timely mitigation. The vulnerability was reserved in September 2025 and published in December 2025, indicating recent discovery. Fortinet has not yet provided patch links, so organizations must monitor vendor advisories closely. The vulnerability’s scope covers multiple major FortiSOAR versions, indicating a broad impact across deployments.
Potential Impact
For European organizations, the impact of CVE-2025-59810 can be significant due to FortiSOAR’s role in centralizing security operations and sensitive incident data. Unauthorized information disclosure could expose internal security workflows, incident response plans, or sensitive credentials, increasing the risk of follow-on attacks such as lateral movement or privilege escalation. Organizations in critical infrastructure sectors (energy, finance, healthcare) that rely on FortiSOAR for automated security orchestration may face increased risk of targeted attacks exploiting leaked information. The medium severity reflects that while system availability and integrity are not directly impacted, confidentiality breaches can undermine trust and compliance with data protection regulations such as GDPR. Additionally, attackers with authenticated access—potentially insiders or compromised accounts—can exploit this vulnerability without user interaction, increasing the threat surface. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. European entities with extensive Fortinet deployments should consider this vulnerability a priority for risk assessment and mitigation.
Mitigation Recommendations
1. Implement strict role-based access controls (RBAC) in FortiSOAR to limit user privileges to the minimum necessary, reducing the risk that an attacker can exploit this vulnerability. 2. Monitor and audit API and system logs for unusual or unauthorized request patterns that could indicate attempts to exploit access control weaknesses. 3. Apply vendor patches immediately once Fortinet releases them; maintain close communication with Fortinet support channels for updates. 4. Conduct internal security reviews and penetration tests focusing on access control mechanisms within FortiSOAR deployments. 5. Enforce multi-factor authentication (MFA) for all FortiSOAR user accounts to reduce the risk of credential compromise. 6. Segment FortiSOAR infrastructure within the network to limit exposure and lateral movement in case of compromise. 7. Educate security operations staff about the vulnerability and encourage vigilance for suspicious activity. 8. Review and update incident response plans to incorporate potential scenarios involving information disclosure from SOAR platforms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-09-22T08:19:21.055Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69385e4e74ebaa3baba142a6
Added to database: 12/9/2025, 5:37:18 PM
Last enriched: 12/9/2025, 5:51:35 PM
Last updated: 12/11/2025, 1:56:01 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumCVE-2025-67511: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aliasrobotics cai
CriticalCVE-2025-67713: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in miniflux v2
MediumCVE-2025-67644: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in langchain-ai langgraph
HighCVE-2025-67646: CWE-352: Cross-Site Request Forgery (CSRF) in Telepedia TableProgressTracking
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.